Skip to content

July 14, 2025

  • Home
  • CySecGeneral
  • Members Login
  • Contact

MCYSEKA-Maritime Cyber Security Knowledge Archive

Global Cyber Security Educational Info Links – real-time news aggregation

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
  • Home
  • Security : Live
  • Hacking : Live
  • Malware : Live
  • Activity
  • OutPost : Archive
    • Maritime Archive
    • StayAware
      • US-Cert
      • DarkReading
      • KrebsonSecurity
      • PCMag
      • CIO
      • Wired
      • Schneier
      • Forbes
      • TechRepublic
      • ZDnet
      • hitb
      • ITSecurityGuru
      • itsecurity.co.uk
      • ThreatPost
      • DanKaminsky
      • EmergentChaos
      • FlyingPenguin
      • HackingArticles
    • CySecGeneral
      • Threatpost
      • Slashdot
      • InfosecIsland
      • Netcraft
      • Kali
      • RSA
      • MSR
      • CRN
      • MIT
  • Tags
    • Web Security
    • Vulnerabilities
    • Cybercrime
    • Mobile Security
    • Malware
    • Backdoor
    • Hacks
    • Encryption
    • Mobile
  • Interactive
    • Threat Cloud Check Point
    • FORTINET Threat Map
    • Kaspersky Cyberthreat Real-Time Map
    • Digital Attack Map
    • Real-time web monitor AKAMAI
  • Tools
    • Structured Data Sections
    • CySec Autobot
    • GlobalNews Autobot
    • Global Defense Autobot
  • Home
  • /

phishing

APT37 Hackers Use Weaponized LNK Files and Dropbox for Command-and-Control Operations

The North Korean state-sponsored hacking group APT37, also known as ScarCruft, launched a spear phishing campaign targeting activists focused on North Korean issues. Named “Operation: ToyBox Story” by Genians Security Center (GSC), this cam…

May 12, 2025
0 comment
Read More >>

Phishing Campaign Uses Blob URLs to Bypass Email Security and Avoid Detection

Cybersecurity researchers at Cofense Intelligence have identified a sophisticated phishing tactic leveraging Blob URIs (Uniform Resource Identifiers) to deliver credential phishing pages directly to users’ inboxes while evading traditional email securi…

May 12, 2025
0 comment
Read More >>

Phishing Campaign Uses Blob URLs to Bypass Email Security and Avoid Detection

Cybersecurity researchers at Cofense Intelligence have identified a sophisticated phishing tactic leveraging Blob URIs (Uniform Resource Identifiers) to deliver credential phishing pages directly to users’ inboxes while evading traditional email securi…

May 12, 2025
0 comment
Read More >>

Scattered Spider Malware Targets Klaviyo, HubSpot, and Pure Storage Platforms

Silent Push researchers have identified that the notorious hacker collective Scattered Spider, also known as UNC3944 or Octo Tempest, continues to actively target prominent services in 2025, including Klaviyo, HubSpot, and Pure Storage. This group, act…

May 9, 2025
0 comment
Read More >>

Threat Actors Leverage Multimedia Systems in Stealthy Vishing Attacks

Threat actors have begun exploiting multimedia systems as a pivotal component of their voice phishing (vishing) attacks. Unlike traditional vishing schemes that rely solely on spoofed phone numbers and social engineering tactics, these advanced operati…

May 9, 2025
0 comment
Read More >>

FreeDrain Phishing Attack Targets Users to Steal Financial Login Credentials

PIVOTcon, joint research by Validin and SentinelLABS has exposed FreeDrain, an industrial-scale cryptocurrency phishing operation that has been stealthily siphoning digital assets for years. This sophisticated campaign leverages search engine optimizat…

May 9, 2025
0 comment
Read More >>

Chinese Hackers Flood Japan with 580 Million Phishing Emails Using ‘CoGUI’ Kit

Chinese hackers used the CoGUI phishing kit to send over 580 million scam emails to Japanese users in early 2025, impersonating brands like Amazon and PayPal.

The post Chinese Hackers Flood Japan with 580 Million Phishing Emails Using ‘CoGUI’ Kit appeared first on eSecurity Planet.

May 9, 2025
0 comment
Read More >>

The many variants of the ClickFix social engineering tactic

As new malware delivery campaigns using the ClickFix social engineering tactic are spotted nearly every month, it’s interesting to see how the various attackers are trying to refine the two main elements: the lure and the “instruction&#8221…

May 8, 2025
0 comment
Read More >>

ClickFix Scam: How to Protect Your Business Against This Evolving Threat

Cybercriminals aren’t always loud and obvious. Sometimes, they play it quiet and smart. One of the tricks of…

May 6, 2025
0 comment
Read More >>

Popular Instagram Blogger’s Account Hacked to Phish Users and Steal Banking Credentials

A high-profile Russian Instagram blogger recently fell victim to a sophisticated cyberattack, where scammers hijacked her account to orchestrate a fake $125,000 cash giveaway. The attackers employed advanced techniques, including AI-generated deepfake …

May 6, 2025
0 comment
Read More >>
1 … 7 8 9 10 11 … 90

Archives

July 2025
M T W T F S S
 123456
78910111213
14151617181920
21222324252627
28293031  
« Jun    

Recent Posts

  • NJ Tesla Kills One by Crashing Into the Back of a Car July 14, 2025
  • Australia news live: Burke defends Segal over husband’s donations to rightwing group; PM will walk tightrope in Xi meeting July 14, 2025
  • [Thread] Some users claim that Grok 4 Heavy responded simply with “Hitler” when asked to “Return your surname and no other text” (Riley Goodside/@goodside) July 14, 2025
  • Texas camp leader waited over an hour after flood warning to evacuate July 14, 2025
  • Despite Trump saying there are no more Epstein files, Lara Trump says he will release more Epstein files July 14, 2025
  • Supreme Court gives Trump go-ahead to gut Department of Education July 14, 2025
  • Motorists rescued as new flash flood warnings hit Central Texas July 14, 2025

Categories Cloud

africa (2905) Americas (30692) AM Update (3981) Army (2902) Australia news (7286) Business (9504) China (4090) Culture (2876) cybersecurity (2728) Cyber Security (2753) Cyber Security News (3201) Donald Trump (3477) Environment (3791) Europe (13465) Foreign Policy (2932) france (3087) Hacking (7046) Health (2883) homesecurity (3593) IFP Exclusive (2689) India (6644) Israel (3740) Mary Patriot News (4801) Media Wire (4127) middle east (4520) Nation (8471) Nation, Nation & World (4416) Nation, World (7862) News (30084) politics (6519) russia (5225) Security (5188) Society (2722) Sports (7959) Tankers (3373) Technology (2913) UK news (14979) ukraine (4890) Uncategorized (3500) US Crime News (5342) US news (10516) US politics (17030) World (63997) World news (20323) worldNews (23069)
RSS Error: A feed could not be found at `https://nvd.nist.gov/download/nvd-rss-analyzed.xml`; the status code is `200` and content-type is `text/html;charset=UTF-8`

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

July 2025
M T W T F S S
 123456
78910111213
14151617181920
21222324252627
28293031  
« Jun    
  • Home
  • CySecGeneral
  • Members Login
  • Contact

© MCYSEKA-Maritime Cyber Security Knowledge Archive